PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5pacparse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
[
{
"id": "CVE-2022-42898-7e74d481",
"digest": {
"line_hashes": [
"185684756605390238103334007784352789624",
"7131579695216385856922531758292910060",
"96067565823201056646313325968740529266",
"307324062224806380958204996069287421659"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "include/bits.c"
},
"source": "https://github.com/heimdal/heimdal/commit/78077c39e355766221383ee48c8b9be0459a82a4",
"signature_type": "Line",
"deprecated": false
}
]
[
{
"id": "CVE-2022-42898-190ec2e6",
"digest": {
"length": 8101.0,
"function_hash": "313212553996591129015720005043578260600"
},
"signature_version": "v1",
"target": {
"file": "src/lib/krb5/krb/t_pac.c",
"function": "main"
},
"source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
"signature_type": "Function",
"deprecated": false
},
{
"id": "CVE-2022-42898-1a970be7",
"digest": {
"line_hashes": [
"47415333018243679864646462913306600925",
"113522990652075189899911575550870172940",
"332636347402384035849490568060121070816",
"24974974711904770793287531419649756654",
"34036481326062071104848288339706052122",
"335906234459261617987938532306053980177",
"154732096699152609497200721234291993685",
"185833400480707633037073703290605393751",
"114563188656008062785041387091874740449",
"258667828208263873189321892773311252565",
"259921342012297268374246674019195512093"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "src/lib/krb5/krb/pac.c"
},
"source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
"signature_type": "Line",
"deprecated": false
},
{
"id": "CVE-2022-42898-705fc6fd",
"digest": {
"line_hashes": [
"203158983188195784883759796692003894593",
"117811727424344157626574231154516038039",
"275952240584579959483060309342236230792",
"87998220430651193888088689122468582815",
"198618692815112439499828060074676714596",
"86990030903086973170313960916416642456"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "src/lib/krb5/krb/t_pac.c"
},
"source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
"signature_type": "Line",
"deprecated": false
},
{
"id": "CVE-2022-42898-d3714872",
"digest": {
"length": 1490.0,
"function_hash": "141063196662638433845114500023813850879"
},
"signature_version": "v1",
"target": {
"file": "src/lib/krb5/krb/pac.c",
"function": "krb5_pac_parse"
},
"source": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
"signature_type": "Function",
"deprecated": false
}
]